CVE-2016-7087

Published on: 12/29/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:07 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Certain versions of Windows from Microsoft contain the following vulnerability:

Directory traversal vulnerability in the Connection Server in VMware Horizon View 5.x before 5.3.7, 6.x before 6.2.3, and 7.x before 7.0.1 allows remote attackers to obtain sensitive information via unspecified vectors.

  • CVE-2016-7087 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
VMware Horizon View CVE-2016-7087 Directory Traversal Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93455
VMware Horizon View Connection Server Lets Remote Users Traverse the Directory to View Potentially Sensitive Information on the Target System - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036972
VMSA-2016-0015 Patch
Vendor Advisory
www.vmware.com
text/html
URL Logo CONFIRM www.vmware.com/security/advisories/VMSA-2016-0015.html

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
MicrosoftWindowsAllAllAllAll
Operating
System
MicrosoftWindowsAllAllAllAll
ApplicationVmwareHorizon View5.0AllAllAll
ApplicationVmwareHorizon View5.0.1AllAllAll
ApplicationVmwareHorizon View5.1AllAllAll
ApplicationVmwareHorizon View5.1.3AllAllAll
ApplicationVmwareHorizon View5.2.0AllAllAll
ApplicationVmwareHorizon View5.3AllAllAll
ApplicationVmwareHorizon View6.0AllAllAll
ApplicationVmwareHorizon View6.0.2AllAllAll
ApplicationVmwareHorizon View6.1AllAllAll
ApplicationVmwareHorizon View6.1.1AllAllAll
ApplicationVmwareHorizon View6.2AllAllAll
ApplicationVmwareHorizon View7.0AllAllAll
ApplicationVmwareHorizon View5.0AllAllAll
ApplicationVmwareHorizon View5.0.1AllAllAll
ApplicationVmwareHorizon View5.1AllAllAll
ApplicationVmwareHorizon View5.1.3AllAllAll
ApplicationVmwareHorizon View5.2.0AllAllAll
ApplicationVmwareHorizon View5.3AllAllAll
ApplicationVmwareHorizon View6.0AllAllAll
ApplicationVmwareHorizon View6.0.2AllAllAll
ApplicationVmwareHorizon View6.1AllAllAll
ApplicationVmwareHorizon View6.1.1AllAllAll
ApplicationVmwareHorizon View6.2AllAllAll
ApplicationVmwareHorizon View7.0AllAllAll
  • cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:5.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:6.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:horizon_view:7.0:*:*:*:*:*:*:*: